• Main Menu
  • Input Devices

    • What is a Biometric Coprocessor?

      What is a Biometric Coprocessor?

      A biometric coprocessor is a device that is capable of scanning a user’s physical attributes in order to allow access to a building or computer network. A biometric coprocessor is essentially a fingerprint reader, but may also include sensors that analyze the user’s eyes, voice, or even breath. The term “biometric coprocessor” comes from the

    • Flatbed Scanner – Pros and Cons

      Flatbed Scanner – Pros and Cons

      A flatbed scanner is a device that is able to scan a document and then convert what it has read into digital information. Flatbed scanners are different from other types of scanner because flatbed scanners allow the user to simply lay the document down on the machine, close the lid, and scan both sides of

    • Pointing Devices

      Pointing Devices

      A pointing device is any piece of hardware that is used to allow a user to input spatial data to a computer. By moving a mouse, pen or a finger around, a user can implement movements and changes on the computer screen. The most common type of pointing device is the mouse and the arrow.

    • How an Optical Mouse Works

      How an Optical Mouse Works

      Optical mice are the de facto standard for mice to communicate between the end user and the computer. The optical mouse is a great improvement of the mechanical mouse that was created in the early 1970s. Agilent Technologies introduced the Optical mouse in 1999. The technology uses a tiny camera that takes thousands of pictures

    • Fingerprint Scanners

      Fingerprint Scanners

      Fingerprint scanners are biometric security systems designed to use the distinct features of an individual's fingerprints to provide security. Fingerprint scanners are now being used in police stations, security-intensive industries and, most recently, on computer shops as a peripheral device for computers. Biology of a Fingerprint Every person has marks on his fingers. These marks

    • Bluetooth Mouse – Advantages and Disadvantages

      Bluetooth Mouse – Advantages and Disadvantages

      Bluetooth technology has become commonplace in modern society and has expanded the ways in which people communicate with each other. Bluetooth has allowed for drivers to talk on the phone without using their hands, teenagers to listen to music without plugging their headphones into their MP3 players, and computer users to be more mobile by

    • Wireless Keyboards

      Wireless Keyboards

      To provide additional portability to computer users, IT manufacturers have created wireless keyboards that do not have to be kept at the user's desk. Wireless keyboards can be used by both desktop and laptop users as the technology used in wireless keyboards is universal to all computer models. While wireless keyboards may offer additional mobility

    • How to Replace a MacBook Keyboard

      How to Replace a MacBook Keyboard

      An Apple MacBook can last some time without the keyboard getting damaged. If the keyboard gets damaged (for e.g. a loose key falls out of the setting) or the user simply wants a new keyboard, he/she will need to replace the keyboard in question. The MacBook has a fairly simple case that users with the

    • Touchpad

      Touchpad

      A touchpad is a computing interface device that typically mimics the functions of a computer mouse. Instead of having an external peripheral device such as a mouse, the touchpad enables the user to interact with the device through the use of a single or multiple fingers being dragged across relative positions on a sensitive pad.

    • How to Lock a Keyboard

      How to Lock a Keyboard

      Many people install security features on their computer in order to prevent unauthorized users from accessing the computer when they are away. For example, login identification, file encryption, and even biometric identification are all sufficient methods of keeping intruders out of someone’s personal information. However, some users may wish to go even further by locking

    input-devices
    } 136 queries in 0.303 seconds.